Social media safety tips for parents of tweens & teens Ginger Kadlec: BeAKidsHero
|
|
- Cecilia Terry
- 7 years ago
- Views:
Transcription
1 Social media safety tips for parents of tweens & teens Ginger Kadlec: BeAKidsHero
2 Online threats are REAL. An astonishing 95% of tweens and teens are online (Source: Pew Research). iphones, ipads and other mobile devices have become "vital" appendages to most teens... those devices are their social lifeline with other teens, as well as their instant connection to the rest of the world. While there are many advantages and fun-aspects of social media, there are also some very real dangers. Teens need help navigating those potential dangers and it s up to parents to play a key role in maintaining teens online safety. Pulling back the covers, we see some very scary statistics: More than 104 million child pornography images have been reviewed by the National Center for Missing and Exploited Children since This is number is increasing at an alarming rate due in large part to the Internet. In fact, the number of new images reviewed in 2013 was an astonishing 24 million, an increase of 30% in just one year. In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes. (Source: Journal of Adolescent Health, 2010) 65% of online sex offenders used the victim's social networking site to gain home and/or school information about the victim. (Source: Journal of Adolescent Health, 2010) 70% of kids ages 8 to 18 report unintentionally stumbling across pornographic images while online. The average age for a child to be exposed to online pornography is just 11 years old (Source: Enough Is Enough) Online threats are very real and can range from mildly age-inappropriate content to cyberbullying to sexual exploitation, assault or even death. So what can you as a parent do to help protect your teen from the very real dangers lurking on the Internet? For starters, know what apps your teen is downloading. Following is a quick rundown of 12 Scary Apps to put at the top of your watch list. *WARNING: Before you continue, please note some of the content in this report is graphic and intended for adults. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 2
3 Ask.fm Ask.fm enables users to anonymously follow your teen and publically ask any question and I mean ANY question. The questions posted on this app cover the gamut! After reading all sorts of things about Ask.fm, I decided to download it myself... and was shocked. Within minutes of using the app, the 2nd question posed to me by an anonymous user was, "What is your bra size?" The image on the right is a screen shot of the stream feed. Please note the nature of the question that randomly appeared in my feed this is an example of what ANY Ask.fm user (i.e., your kids) could see in the stream. Ask.fm Questions screen shot. Ask.fm does offer some privacy settings, including the ability to hide posts from the stream and blacklist users. This app is highly integrated with Facebook and Twitter, so questions/responses to your teen s account can be set-up to automatically post to those apps, increasing the viral nature of the content generated on Ask.fm. YourSphere.com actually calls Ask.fm "a toxic site. Numerous cases of cyberbullying, some leading to suicide, can be tracked back to this app. Ask.fm Stream screen shot. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 3
4 Qooh.me Similar to Ask.fm., Qooh.me allows users to post anonymous questions it has been reported that the anonymous questions posed are often mean spirited or totally inappropriate, even though the Qooh.me 'terms and conditions' state, "You may not use Qooh.me to abuse, bully, harass, threaten, malign, slander, impersonate or intimidate anyone." There are no age requirements or parental controls. Under its Cool Tips, Qooh.me allows users to tag others, totally anonymously. In fact, it states, The person you TAG won t see that (you re) tagging them. This gives you privacy. As with Ask.fm, questions are anonymous and Qooh.me specifies that the questions are untraceable. Oh, the cyberbullying dangers lurking in this app are endless 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 4
5 Creepy This name certainly fits the app! Creepy extracts geolocation data from other apps your teen is using (such as FourSqaure, Twitter or Flickr) and combines that with all public information about your teen that is available online. It then takes that data and actually plots on a map the physical whereabouts of your teen. Creepy can also provide a history of the places your teen has been based on the history of tweets and other social media posts. As you can imagine, this app can and has been used for predatory purposes, including stalking. Creepy screen shot (Source: softonic.com) Snapchat Widely known as "the sexting app, kids often think photos they share using Snapchat show from 1 to 10 seconds then immediately disappear... not true. Screenshots can be saved then distributed to others or photos can be sent to multiple recipients. The cute little Snapchat ghost logo is looks innocent enough, but please be aware of how this app can be misused. Snapchat icon (Source: Google Play) 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 5
6 Kik Kik user guidelines specify this app is intended for people aged 17 and older... but tweens and teens are actively using it. In fact, Kik is another commonly used sexting app. Teens often promote their Kik names on Instagram, posting "Kik me at <insert their Kik user ID>". BeWebSmart.com conducted research on this app and found some alarming, pretty standard activity (see example screen shot on right). Much of the content is adult in nature and really is not intended for younger audiences. Kik logo (Source: Technology Guide) BeWebSmart.com reminds parents, "Remember, you don t need a phone to use iphone apps; if your child has an ipod touch or an ipad, they can install iphone apps. Kik is just one of many free texting apps available in the App store." Kik screenshot (Source: BeWebSmart.com) 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 6
7 Vine This 6-second video production app is used by many for legitimate purposes, but it also has a dark side. When it was initially launched, Vine was heavily used to distribute pornography. Vine attempted to remove as much porn as they could, but users found a way to get around that by simply changing the hashtags they were using. Terms of service have not changed since 2013, so sexual content and nudity are still permitted on Vine. Pheed One of the fastest growing apps around, Pheed has been touted by Forbes as 'the new Twitter' and Huffington Post as 'the next generation of social media.' With 81% of its user base aged 14 to 25, Pheed is incredibly popular among teens. Its design resembles a Facebook page and its functionality is like Instagram on steroids. Pheed offers live stream broadcast capability and, unlike Vine, doesn't set a time limit for video or audio streaming. Pheed offers parental controls to restrict the channels that can be viewed (users rate their own channels). The good news is Pheed guidelines really do attempt to make it a safer site. Because of its growing popularity, this is a good one for parents to monitor, though. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 7
8 Whisper Known as a secrets app, Whisper allows users to anonymously post secrets they want to share by creating an online poster complete with a graphic underlay and the user s secret in text on top of the image. According to The Atlantic in August 2013, Whisper was getting 2.5 billion page views per month, way more than even a media powerhouse like CNN. Users can remain anonymous and reply either publically or privately to other whispers. Visit the Whisper homepage to get a feel for the type of content on this app much of it is adult in nature. The danger in this app lies in teens engaging in private conversations and sharing personal information with potential predators. It is also has the potential to be a cyberbullying breeding ground. Post Secret Another secrets sharing app, Post Secret allows users to post anonymous secrets on one side of a homemade post card. This app began as a community mail art project and has grown into a hugely popular social media site. According to Youth Trends' February 2008 "Top Ten List Report", Post Secret was the 10th most popular site among female students in the USA (Source: Wikipedia). While some content is benign, much of it is intended for an adult audience (example: see postcard on right). Image source: Whisper.com Image source: PostSecret.com 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 8
9 Girls Around Me Sometimes referred to as a stalking app, the super creepy Girls Around Me app uses geolocation technology that connects to other apps (such as Four Square or Facebook) to identify the location of females (or males gender selection is user-specified) in the user s immediate physical area. Tying this back to one of the scary statistics about Internet predators, over 25% of online sexual offenders used their victims social media sites to identify the physical location of those victims. Girls Around Me just makes it that much easier. Pretty scary stuff. Grindr Image source: Cult of Mac Another geolocation app is Grindr. Geared towards gay, bisexual and bi-curious men, this networking app s geolocation capabilities allows users to locate other men that are in close proximity. It shows a grid with photos of users that are in the same geographic area, as well as profiles and the options to chat, share pictures or provide more detail geographic information. Minimum age for use is 18, but youth are fudging their ages and using this app, as well. Image source: Wikipedia 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 9
10 Tinder Using information from Facebook profiles, Tinder is yet another geolocation networking app that connects people in close proximity. The danger in these types of apps is that they are used by sexual predators to troll for children, both girls and boys. Image source: Wikipedia Tinder has a minimum age for use of 13-years old. As an added safety precaution, Tinder only allows users to interact with other users in their same age group for youth, that age group is 13 to 17 years old. Tinder relies on data from Facebook to assign users to age groups. The potential danger in this lies in the fact that adult sexual predators can, and in fact do, establish alias Facebook accounts purporting to be minors. of other scary apps? Please share them with me at ginger@gingerkadlec.com. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 10
11 What can parents do? Parents can limit the types of apps their teens download to digital devices via parental control functions on iphone or ipads. Various apps are assigned ratings (source: itunes): 4+ Applications in this category contain no objectionable material. 9+ Applications in this category may contain mild or infrequent occurrences of cartoon, fantasy or realistic violence, and infrequent or mild mature, suggestive, or horror-themed content which may not be suitable for children under the age of Applications in this category may also contain infrequent mild language, frequent or intense cartoon, fantasy or realistic violence, and mild or infrequent mature or suggestive themes, and simulated gambling which may not be suitable for children under the age of You must be at least 17 years old to purchase this application. Applications in this category may also contain frequent and intense offensive language; frequent and intense cartoon, fantasy or realistic violence; and frequent and intense mature, horror, and suggestive themes; plus sexual content, nudity, alcohol, tobacco, and drugs which may not be suitable for children under the age of 17. Image source: BeWebSmart.com BeWebSmart.com offers a simple step-by-step guide to restrict application downloads by rating. These steps should work for Apple products including iphones and ipads. For parental controls on other types of digital devices, please refer to the manufacturers' websites for details and instructions. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 11
12 Parents: be app wise! It may seem daunting, but your teens need YOU to help be sure the apps they use, whether on their own mobile devices or on a friend s computer, are being used in a safe manner. To help keep your teens safe, try these tips: 1. Limit the number of apps they can use. Have your teen select two or three apps they most wish to use. Then, you trust by verify by checking their iphone, computer or other mobile devices to be sure they are abiding by that limitation. 2. Sign a social media contract with your teen. I love this idea! Social media contracts help outline the do s and don ts for both you and your teen. Plus, the act of signing a contract really does add a level of accountability to your teen for their responsible use of technology. You can search the Internet for some good samples of social media contracts to customize and make your own. One resource is Common Sense Media it offers some age-appropriate contracts for kids K-12 check em out at 3. Computers and cell phones belong to YOU, the parent. Did you pay for that piece of technology? Are you paying the monthly service fees? Who is legally responsible for the actions of your child? If you answered yes to even one of these questions, the ultimate decision making power about which apps to use or not to use belongs with YOU, the parent or guardian. It is a privilege, not a right, for your teen to use technology and social media. If your teen abuses the privilege, then the privilege should be revoked and consequently used as a teaching moment to help your teen not make a similar mistake in the future. I offer this information to you as a place to start. Engage. Talk with your teens about Internet and social media safety. If you aren t familiar with an app you find on your teen s iphone or ipad, Google it! Learn as much as you can about the pitfalls and potential dangers of apps your teens are using and discuss with them ways to use those apps safely. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 12
13 For More Information You may also find these online resources helpful: Please don t hesitate to contact me on my website at or ginger@beakidshero.com. I will do my best to find answers for you. Thank You! Special thanks to Hamilton County Sheriff s Department Detective Alex Petty for his input and guidance on the list of apps in this report. Thanks, too, to the various news and social media outlets from whom information was shared as part of this report, including: Pew Research National Center for Missing and Exploited Children Journal of Adolescent Health Enough Is Enough Yoursphere Be Web Smart Softonic Forbes Huffington Post The Atlantic Google Play Technology Guide Cult of Mac Wikipedia itunes Disclaimer: Material presented in this document and on gingerkadlec.com is intended for information purposes only. It is not intended as professional advice and should not be construed as such. Ginger Kadlec: BeAKidsHero does not necessarily sponsor, endorse or otherwise approve of the materials appearing in sites referenced in this report. 12 SCARY APPS 2015 Ginger Kadlec: BeAKidsHero Page 13
15 Dangerous Apps Every Parent Should Know About
15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges
More informationA Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationA Parents' Guide to. 2014 ConnectSafely.org
A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram
More informationA Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk
A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the
More informationHow To Avoid The Identity Theft Predators
Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationPARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com
PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the
More informationKingsley Park Primary School. 1-1 ipad Program BYOD
Kingsley Park Primary School 1-1 ipad Program BYOD 2016 Kingsley Park Primary School ipad 1-1 BYOD Program In 2015 KPPS implemented a 1-1 BYOD [bring your own device] Program for Grades 4-6. We will be
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informatione-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationHOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
More informationeffects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationCyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationPARENT UNIVERSITY OFFICER JOE BOYD OFFICER RACHAEL FREEMAN
PARENT UNIVERSITY OFFICER JOE BOYD OFFICER RACHAEL FREEMAN SRO DIVISION Sgt. Eric Debus Officers Chris Cobb and Diane Patterson (CHS) Officer RJ Harr (New Tech) Officer Joe Boyd (CMSW, Pinkerton, Wilson,
More informationSocial Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
More informationA Parents' Guide to. Snapchat. 2013 ConnectSafely.org
A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their
More informationParents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
More informationLiving Online: Using Technology Wisely Lesson. Guide
Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents 11-14 Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How
More informationGrand Canyon Council - Social Media Policy
INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested
More informationCyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationBy Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
More informationCOPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act
The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationesmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2
Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationInternet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
More informationSOCIAL MEDIA & DIGITAL MARKETING POLICIES AND PROCEDURES
SOCIAL MEDIA & DIGITAL MARKETING POLICIES AND PROCEDURES The purpose of the Social Media and Digital Marketing Policy is to ensure the proper use of county social sites, web based marketing and technologies
More informationHuman trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
More informationAuthorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationE-Safety Awareness. Parents and Carers
E-Safety Awareness Parents and Carers Bullying online by people in my school year has left me with significant mental health issues for which I am now on medication and in therapy for. So it s really damaged
More informationBullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
More informationOnline Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk
Online Reputation Luke www.ceop.police.uk www.thinkuknow.co.uk Child Exploitation Online Protection Centre (CEOP) Never give out your personal information Parents 1 When should I report to CEOP? How to
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationOnline Safety How to Protect Yourself and Your Family
Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing
More informationwww.xxxchurch.com Online Predators & Strangers
www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationUniversity Schools Social Media Guidelines for Employees
University Schools Social Media Guidelines for Employees Purpose of Social Media Guidelines All University Schools Laboratory Employees are subject to the Ball State University Social Media Policy available
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More information!! What dangers do your!children!face when they go online?!! All!who!participate!in!activities!online!face!risks!when!they!use!the!
What dangers do yourchildrenface when they go online? Allwhoparticipateinactivitiesonlinefaceriskswhentheyusethe Internet,includingadults.Theworldisconstantlychangingwithnew technologyavailabledaily.itmayfeeloverwhelmingwhenwefocuson
More informationHuman Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
More informationA Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
More informationThe Social Media Guide For Small Businesses
The Social Media Guide For Small Businesses Authored By: Justin Rissmiller, Owner & Operator A Publication Of: T&R Solutions: Define. Design. Progress. YOUR LOGO Contents An Introduction To Social Media
More information2014 Teen Internet Safety Survey. Conducted by The Futures Company
2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online
More informationWHAT YOUR TEEN IS DOING ON SOCIAL MEDIA
WHAT YOUR TEEN IS DOING ON SOCIAL MEDIA THE GUIDE 2014 EDITION It s undeniable that Social Media has changed the way teenagers experience the world. Your teens are on social media as soon as they get up,
More informationOffice of Communications Social Media Handbook
Office of Communications Social Media Handbook Table of Contents Getting Started... 3 Before Creating an Account... 3 Creating Your Account... 3 Maintaining Your Account... 3 What Not to Post... 3 Best
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationPhone Apps for Online Safety Apple and Android
Phone Apps for Online Safety Apple and Android Safe Eyes Mobile (Mobile App) Control your child's Internet usage while she's on the iphone by blocking questionable sites. This app has YouTube filtering
More information6 BEST SOCIAL SELLING TECHNIQUES TO HELP YOU MOVE THE CONVERSATION NEEDLE
6 BEST SOCIAL SELLING TECHNIQUES TO HELP YOU MOVE THE CONVERSATION NEEDLE Sponsored by: Follow us on: JACK KOSAKOWSKI Jack Kosakowski covers Buffer, Crowdfire App and Hootsuite. Here is his LinkedIn profile
More informationThe webcast will begin shortly. Please stand by.
The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone
More informationWho's chatting to your kids?
N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationEmpowering young people to be safe on the Internet. Information for parents, teachers and community members
Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information
More informationONLINE PREDATORS & PREDATORS
the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.
More informationRISKS OF ELECTRONIC COMMUNICATION 2
Palacký University Olomouc FACULTY OF EDUCATION Centre for the Prevention of risky virtual communication Czech Republic RISKS OF ELECTRONIC COMMUNICATION 2 SURVEY RESEARCH REPORT CONDUCTED WITHIN A PROJECT
More informationGirls & Cyber- bullying
MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts
More informationParenting & Technology: The Internet, Texting & Social Networks
Parenting & Technology: The Internet, Texting & Social Networks Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety online Instant messaging,
More informationIowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
More informationInternet Safety Kit. A wake-up call for safer surfing online for the young people in your life.
Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for
More informationSocial Media Strategy
Social Media Strategy Tonbridge School Social Media Strategy We believe social media is important to the school and its communications. Tonbridge School should share messages about academic excellence,
More informationCommon Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
More informationNower Hill High School
Nower Hill High School An introduction to E-Safety Louise Voden, Ben Ford & PC Ian Scanlon Outcomes: Highlight the potential risks young people may face online Describe the technologies and functions Outline
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationTeen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications
More informationChapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
More informationLt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
More informationToday s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
More informationTWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY
TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message
More informationUNSUPERVISED AND ONLINE
UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163
More informationSafety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
More informationUsing apps safely and securely on your mobile
Using apps safely and securely on your mobile In association with: Apps are becoming an increasingly important way to communicate and access the internet through our phones, tablets and TVs. We use them
More informationCyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
More informationTizen Validation Guidelines
Tizen Validation Guidelines Tizen Validation Guide Index 1. Introduction... 3 2. Application Validation Process... 4 2.1 Initial Inspection & Dynamic Analysis... 4 2.2 Content Review & Final Confirmation...
More informationUSES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?
TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to
More informationPredators will use information obtained from children to gain trust and friendship
1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and
More informationEastern University Social Media Policy & Guidelines for Use
Eastern University Social Media Policy & Guidelines for Use Office of University Relations August 2015 Table of Contents Eastern University and Social Media Personal Social Media Use How to Get Started
More informationThings to remember when using social media
Things to remember when using social media July 2014 email hello@commonagency.com phone 01484 437454 Yorkshire studio The Media Centre 7 Northumberland St. Huddersfield West Yorkshire HD1 1RL London office
More informationTRANSCRIPT. Fred.: The basic definition of a cyber-trap is a real world legal issue that kids can get into through the use of electronics.
Across the Fence University of Vermont Extension 106 High Point Center, Suite 300 Colchester, Vermont 05446-8800 802-656-5059 or 888-283-3430 www.uvm.edu/extension/atfblog/ TRANSCRIPT EPISODE DATE: 7/18/12
More informationFIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766
FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY www.cheezo.org 303-271-6766 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office
More informationDeborah Werner. Deborah Werner Project Director SAMHSA s TA and Training on Women and Families Impacted by Substance Abuse and Mental Health Problems
Welcome Deborah Werner Deborah Werner Project Director SAMHSA s TA and Training on Women and Families Impacted by Substance Abuse and Mental Health Problems Technical Information Your lines will be muted
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationThe Digital Life of Teens
The Digital Life of Teens Trends, Concerns, and Impacts Yoon Hyung Choi Amanda Purington Main Themes Digital Media Usage and Access How do teens and tweens access digital media? What do they do online?
More informationMelville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students
Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3
More informationStudent use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More informationOffice of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW
Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW Most parents report having a safety conversations with their children regarding online safety
More informationIMPACT OF SOCIAL NETWORKING SITES (SNS) ON THE YOUTH
IMPACT OF SOCIAL NETWORKING SITES (SNS) ON THE YOUTH Ms. Shabnam S. Mahat Assistant Professor Department of Computer Applications Bharati Vidyapeeth Deemed University, IMRDA, Sangli. Dr. S. D. Mundhe Director,
More information